Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12321 articoli, 10922 italiano, 1399 inglese)12321 articoli
10922 italiano, 1399 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

What a hacker attack! Ursula von der Leyen’s plane was the victim of an electronic warfare attack (EW)
A disturbing episode of electronic warfare (EW) directly involved the President of the European Commission, Ursula von der Leyen. On approach to Plovd...
BruteForceAI: When AI Learns to Hack Logins Better Than a Human Hacker
BruteForceAI is a new penetration testing framework that combines artificial intelligence and automation to take brute-force to the next level. Develo...
Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon
A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to hi...
Transparency and Resilience: NIST Publishes Meta-Framework to Change Supply Chain Management
The National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), has introduced a decentral...
New AI-powered stethoscope now delivers cardiac diagnoses in 15 seconds
British doctors have tested an advanced stethoscope equipped with artificial intelligence capable of detecting three serious heart conditions in just ...
WhatsApp wins $167 million lawsuit against NSO and its Pegasus spyware
A major legal breakthrough is upon us. A US court has ordered NSO Group, a notorious spyware maker, to pay $167 million to WhatsApp. This ruling stems...
IBM and AMD Create New Architectures Between Quantum Computing and High-Performance Computing (HPC)
IBM and AMD will develop new computing architectures at the intersection of quantum and classical approaches, writes the AMD press office. Executives ...
DarkMirror H1 2025 Released: Dark Lab’s Ransomware Threat Report
Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.
In Russia, a law amending fines from 3,000 to 5,000 rubles for deliberately searching for extremist material on the Internet, including using a VPN, c...
Managed SOC: A Strategic Choice for Corporate Cybersecurity
In recent years, companies have faced a radical shift in managing their cybersecurity. The growing complexity of digital infrastructures, the spread o...
Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.
An independent hacker has uncovered hidden data related to a fatal accident involving a Tesla in Florida in 2019, reigniting the debate over the autom...
Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution
Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many ...
Navy and Marine Corps test hydrogen balloon and drone surveillance system
At Outlying Landing Field Seagle in California, the U.S. Navy and Marine Corps tested a new system that allows ships to “see beyond the horizon.” ...
Microsoft denies that the August update damaged SSDs: Users say otherwise.
Microsoft has denied that the August Windows 11 security update is linked to mass complaints of storage device failures. The investigation was launche...
GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories
By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons...